Static task
static1
Behavioral task
behavioral1
Sample
c4ad71ca690d3327493068a17ed70eefa7937f9c787483336c7d57a6959dbb13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4ad71ca690d3327493068a17ed70eefa7937f9c787483336c7d57a6959dbb13.exe
Resource
win10v2004-20221111-en
General
-
Target
c4ad71ca690d3327493068a17ed70eefa7937f9c787483336c7d57a6959dbb13
-
Size
870KB
-
MD5
676bece9069a341ecd4b172a1e5c0276
-
SHA1
2587132d96000a77fe32478c6342acadfef31433
-
SHA256
c4ad71ca690d3327493068a17ed70eefa7937f9c787483336c7d57a6959dbb13
-
SHA512
7c6f78795240f261eff1d4c48176c22347d145f1ec171299e4d5592341212c0ec0de79c4e38cba76fed020da93f6da57fdfcebda7f632098cbcd808dba8060c2
-
SSDEEP
12288:tbSBJeDRhQl+yWALKIUTRLNQSqjGTCmI2S75oRMiswfMoX1gM:tbSBJeQKA+IoZLPI7SRMofH
Malware Config
Signatures
Files
-
c4ad71ca690d3327493068a17ed70eefa7937f9c787483336c7d57a6959dbb13.exe windows x86
e0626640e018916f5439a88ac60153a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
ResetEvent
GetCommandLineW
GetACP
GetModuleFileNameA
HeapDestroy
GetEnvironmentVariableA
GetStartupInfoA
GetStdHandle
SetLastError
ReleaseMutex
GetModuleHandleA
TlsGetValue
CancelIo
SetEvent
IsBadCodePtr
CreateFileMappingA
TlsAlloc
CreateFileA
HeapCreate
advapi32
ClearEventLogW
RegCreateKeyExW
ControlService
IsValidAcl
RegQueryValueW
RegDeleteValueA
IsValidSecurityDescriptor
CreateProcessAsUserA
IsTextUnicode
IsValidSid
InitializeSid
CreateServiceW
RegEnumKeyA
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 862KB - Virtual size: 861KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ